Forem

Security

Hopefully not just an afterthought!

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency
Cover image for Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Architectural Asymmetry in Authentication: Part 3 — Behavioral Automation and Phishing Efficiency

Comments
3 min read
Android Is Losing Its Freedom: Google's 2026 Developer Verification Explained
Cover image for Android Is Losing Its Freedom: Google's 2026 Developer Verification Explained

Android Is Losing Its Freedom: Google's 2026 Developer Verification Explained

1
Comments 1
6 min read
I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

I Built a CIS Benchmark Compliance Checker That Works on Both macOS and Linux

1
Comments
2 min read
Your Enterprise Customer Just Asked for a SOC 2 Type 2 Report. Now What?

Your Enterprise Customer Just Asked for a SOC 2 Type 2 Report. Now What?

5
Comments 2
6 min read
How to Detect Bot Traffic by IP Address (JavaScript)

How to Detect Bot Traffic by IP Address (JavaScript)

Comments
5 min read
The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

The Wikipedia Mass Hack That Never Happened — And Why That's the Real Story

Comments
6 min read
How to Detect VPN and Proxy Users by IP Address (JavaScript)

How to Detect VPN and Proxy Users by IP Address (JavaScript)

1
Comments
5 min read
Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000
Cover image for Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000

Your Server's Public Key Is All I Need to Become Admin, CVE-2026-29000

1
Comments
5 min read
GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

GHSA-W75W-9QV4-J5XJ: GHSA-W75W-9QV4-J5XJ: Path Traversal in dbt-common Archive Extraction

1
Comments
2 min read
How to Build a Phishing URL Scanner in JavaScript (Free APIs)

How to Build a Phishing URL Scanner in JavaScript (Free APIs)

Comments
5 min read
AWS IAM Explained Without Making Your Head Hurt

AWS IAM Explained Without Making Your Head Hurt

1
Comments
3 min read
Introducing Contextual Access: The Third Layer of AI Agent Security

Introducing Contextual Access: The Third Layer of AI Agent Security

Comments
8 min read
I built an eBPF-powered "Judge" that executes packets based on Shannon Entropy. Break my Realm.

I built an eBPF-powered "Judge" that executes packets based on Shannon Entropy. Break my Realm.

Comments
2 min read
How to Handle Sensitive Data Securely in Terraform

How to Handle Sensitive Data Securely in Terraform

1
Comments
3 min read
Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Breaking: New "PleaseFix" Vulnerabilities Turn AI Agents Against Their Users

Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.